Nothing Special   »   [go: up one dir, main page]

DE602007005843D1 - EFFICIENT DATA INTEGRITY PROTECTION - Google Patents

EFFICIENT DATA INTEGRITY PROTECTION

Info

Publication number
DE602007005843D1
DE602007005843D1 DE602007005843T DE602007005843T DE602007005843D1 DE 602007005843 D1 DE602007005843 D1 DE 602007005843D1 DE 602007005843 T DE602007005843 T DE 602007005843T DE 602007005843 T DE602007005843 T DE 602007005843T DE 602007005843 D1 DE602007005843 D1 DE 602007005843D1
Authority
DE
Germany
Prior art keywords
rnd
mac
electronic circuit
value
integrity protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
DE602007005843T
Other languages
German (de)
Inventor
Christian Gehrmann
Ben Smeets
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telefonaktiebolaget LM Ericsson AB
Original Assignee
Telefonaktiebolaget LM Ericsson AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget LM Ericsson AB filed Critical Telefonaktiebolaget LM Ericsson AB
Publication of DE602007005843D1 publication Critical patent/DE602007005843D1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • H04L2209/043Masking or blinding of tables, e.g. lookup, substitution or mapping
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Error Detection And Correction (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)
  • Sorption Type Refrigeration Machines (AREA)
  • Gyroscopes (AREA)
  • Lubricants (AREA)

Abstract

A message authentication code, MAC, is generated in an electronic circuit, wherein the MAC integrity protects a data value, PD. A random challenge word, RND, is received from a source that is external to the electronic circuit. A first function G(RND,K) is evaluated that generates a first encrypted value, K′, from RND and K, wherein K is a secret key value that is stored on the electronic circuit. A second function F(RND,K) is evaluated that generates a second encrypted value, K″, from RND and K. The MAC is then generated in accordance with MAC=K″+m1K′+m2K′2+ . . . +MlK′l, wherein m1, m2, . . . , ml are derived by representing the data value, PD, as an l-tuple of elements in a field, GF(2n), wherein n is an integer greater than zero. A hardware-efficient arrangement is also disclosed for generating this and other MACs.
DE602007005843T 2006-12-14 2007-12-11 EFFICIENT DATA INTEGRITY PROTECTION Active DE602007005843D1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/611,128 US8036380B2 (en) 2006-12-14 2006-12-14 Efficient data integrity protection
PCT/EP2007/063712 WO2008071703A2 (en) 2006-12-14 2007-12-11 Efficient data integrity protection

Publications (1)

Publication Number Publication Date
DE602007005843D1 true DE602007005843D1 (en) 2010-05-20

Family

ID=38229977

Family Applications (1)

Application Number Title Priority Date Filing Date
DE602007005843T Active DE602007005843D1 (en) 2006-12-14 2007-12-11 EFFICIENT DATA INTEGRITY PROTECTION

Country Status (7)

Country Link
US (1) US8036380B2 (en)
EP (1) EP2103033B1 (en)
JP (1) JP5150642B2 (en)
AT (1) ATE463899T1 (en)
DE (1) DE602007005843D1 (en)
TW (1) TWI439101B (en)
WO (1) WO2008071703A2 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9032202B2 (en) * 2012-02-23 2015-05-12 Vencore Labs, Inc. Privacy-preserving publish-subscribe protocol in a cloud-assisted model
TWI517655B (en) 2013-05-23 2016-01-11 晨星半導體股份有限公司 Cryptographic device and secret key protection method
US10256973B2 (en) * 2016-09-30 2019-04-09 Intel Corporation Linear masking circuits for side-channel immunization of advanced encryption standard hardware
US11171949B2 (en) * 2019-01-09 2021-11-09 EMC IP Holding Company LLC Generating authentication information utilizing linear feedback shift registers
CN115114633A (en) * 2021-03-23 2022-09-27 中国科学院微电子研究所 Encryption method and device
KR20230173286A (en) 2022-06-17 2023-12-27 삼성전자주식회사 Semiconductor memory device generating message authentication code using puf and method for generating message authentication code thereof
CN115314206B (en) * 2022-08-08 2024-10-18 桂林电子科技大学 Stream cipher realization method based on NFSR and clock control double LFSR
CN118227372B (en) * 2024-05-23 2024-09-10 深圳市领存技术有限公司 Storage method based on rank metric error correction code and related products

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5351301A (en) * 1980-03-03 1994-09-27 The United States Of America As Represented By The Director Of National Security Agency Authenticator circuit
CH664056A5 (en) * 1984-11-02 1988-01-29 Borer Communications Ag METHOD AND DEVICE FOR CONVERTING A DIGITAL DATA SEQUENCE IN THE ENCRYPTED FORM.
US5051999A (en) * 1989-03-13 1991-09-24 Motorola, Inc. Programmable error correcting apparatus within a paging receiver
IL94449A (en) * 1990-05-20 1994-06-24 Fortress U & T 2000 Ltd Method and apparatus for exponentiation over gf(2")
TW266280B (en) 1993-05-10 1995-12-21 Siemens Ag
US5345507A (en) * 1993-09-08 1994-09-06 International Business Machines Corporation Secure message authentication for binary additive stream cipher systems
SG50474A1 (en) * 1993-11-04 1998-07-20 Cirrus Logic Inc Finite field inversion
US5642367A (en) * 1994-02-07 1997-06-24 Mitsubishi Semiconductor America, Inc. Finite field polynomial processing module for error control coding
US5864491A (en) * 1997-11-10 1999-01-26 Telefonaktiebolaget L M Ericsson Apparatus and associated method for generating a pseudo random number
US6816968B1 (en) * 1998-07-10 2004-11-09 Silverbrook Research Pty Ltd Consumable authentication protocol and system
US6463448B1 (en) * 1999-09-30 2002-10-08 Agere Systems Guardian Corp. Linear intrasummed multiple-bit feedback shift register
IL132898A (en) * 1999-11-11 2009-09-01 Nds Ltd System for bitstream generation
US6804354B1 (en) 1999-12-02 2004-10-12 Honeywell International Inc. Cryptographic isolator using multiplication
JP3864675B2 (en) * 2000-03-09 2007-01-10 株式会社日立製作所 Common key encryption device
US6963976B1 (en) * 2000-11-03 2005-11-08 International Business Machines Corporation Symmetric key authenticated encryption schemes
US7200227B2 (en) * 2001-07-30 2007-04-03 Phillip Rogaway Method and apparatus for facilitating efficient authenticated encryption
US7895253B2 (en) * 2001-11-30 2011-02-22 Analog Devices, Inc. Compound Galois field engine and Galois field divider and square root engine and method
US6895545B2 (en) * 2002-01-28 2005-05-17 Broadcom Corporation System and method for generating cyclic codes for error control in digital communications
US7003713B2 (en) * 2002-05-16 2006-02-21 Broadcom Corporation Variable Hamming error correction for a one-time-programmable-ROM
ATE318034T1 (en) 2002-09-16 2006-03-15 SECURE MANUFACTURING PROCESS
DE10250831B3 (en) * 2002-10-31 2004-06-17 Infineon Technologies Ag Device and method for generating a pseudorandom sequence of numbers
KR100478974B1 (en) * 2002-12-03 2005-03-25 한국전자통신연구원 Serial finite-field multiplier
US7296213B2 (en) * 2002-12-11 2007-11-13 Nvidia Corporation Error correction cache for flash memory
TW200629192A (en) * 2005-02-03 2006-08-16 Sanyo Electric Co Random number generating circuit
US8516258B2 (en) * 2005-03-01 2013-08-20 Nxp B.V. Generator for generating a message authentication code, method of generating a message authentication code, program element and computer-readable medium
KR100800800B1 (en) * 2005-08-30 2008-02-04 삼성전자주식회사 Pseudorandom binary sequence generation method and apparatus using linear feedback shift register

Also Published As

Publication number Publication date
JP5150642B2 (en) 2013-02-20
EP2103033B1 (en) 2010-04-07
WO2008071703A2 (en) 2008-06-19
JP2010513941A (en) 2010-04-30
WO2008071703A3 (en) 2008-09-18
US20080144819A1 (en) 2008-06-19
ATE463899T1 (en) 2010-04-15
US8036380B2 (en) 2011-10-11
EP2103033A2 (en) 2009-09-23
TWI439101B (en) 2014-05-21
TW200833054A (en) 2008-08-01

Similar Documents

Publication Publication Date Title
ATE463899T1 (en) EFFICIENT DATA INTEGRITY PROTECTION
US10097342B2 (en) Encoding values by pseudo-random mask
ES2244639T3 (en) LINEAR TRANSFORMATION FOR SYNTHETIC KEY ENCRYPTION.
WO2009002599A3 (en) Electronically securing an electronic device using physically unclonable functions
CN103780379B (en) Cipher encrypting method and system and cryptographic check method and system
KR20150064148A (en) System for generating a cryptographic key from a memory used as a physically unclonable function
JP2017504838A (en) Countermeasures against side-channel attacks against cryptographic algorithms
WO2011088074A3 (en) System and methods for generating unclonable security keys in integrated circuits
WO2010100015A1 (en) System for establishing a cryptographic key depending on a physical system
US10171234B2 (en) Wide encoding of intermediate values within a white-box implementation
ES2952534T3 (en) A method, system and apparatus using forward secure cryptography for verification of access codes
DE602008004155D1 (en) UTHENTIFIZIERUNGSDATEN
ATE325377T1 (en) VALIDITY CHECK OF FIRMWARE
CN102156843B (en) Data encryption method and system as well as data decryption method
EP3125462A1 (en) Balanced encoding of intermediate values within a white-box implementation
US20230224285A1 (en) Affine masking for secure encryption schemes
Yi Security of Chien's efficient time-bound hierarchical key assignment scheme
US10630462B2 (en) Using white-box in a leakage-resilient primitive
US20170286647A1 (en) Watermarking input and output of a white-box implementation
CN105721134B (en) It is realized using the single whitepack with multiple external encodes
GB2419764B (en) Encoding and detecting apparatus
KR101631680B1 (en) Physically unclonable function circuit using S-box of AES algorithm
WO2008102693A1 (en) Authentication system using light-weight authentication protocol
US7813507B2 (en) Method and system for creating random cryptographic keys in hardware
CN106921490B (en) True random number generator and label chip

Legal Events

Date Code Title Description
8364 No opposition during term of opposition